Threat Detection for Common MITRE ATT&CK Techniques

If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on the new standard to assess the effectiveness of your security monitoring and alerting capabilities — the MITRE ATT&CK framework.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

This is Security: Nothing is what it SIEMs

Alert Logic

Companies of every size and across every industry need to have the solution to defend against cyber attacks. For medium-sized and budget-constrained companies especially – the array of security technologies and solution and the volume of cyber threats can make the challenge seem overwhelming. Organizations suffer trying to manage raw data, security events and false positive incidents with limited context, overworked staff, and a lack of threat landscape knowledge. There is a better way to improve your security without the time, effort, and cost of purchasing and integrating multiple tools, a traditional SIEM or expensive traditional security outsourcing vendors.
Watch Now

Inside the Front Lines of Cyber Defense

Alert Logic

A Security Operations Center (SOC) provides proactive threat monitoring, threat detection, and advice to stop threats quickly. But you may be surprised at what goes on behind the scenes to keep you safe. Hear first-hand how our SOC team works tirelessly to thwart attackers — from the analysts themselves. We’ll also discuss Alert Logic’s new cybersecurity report which shows how broad, continuous assaults of massive scale dominate today’s attacks.
Watch Now

Intelligent API Cybersecurity, Is Your Agency Protected?

Carahsoft

As government agencies move towards digital transformation, Cyber threats are getting smarter, using social engineering, brute force methods, and even artificial intelligence (AI) to bypass common defenses to gain access to these critical systems and data. To help protect Federal Agencies against an ever-diversifying landscape of cybersecurity threats, Axway and Ping Identity have formed a global partnership to deliver a comprehensive Application program Interface (API) security solution that optimizes security at all levels, from network to application.
Watch Now

Zimperium & IBM MaaS360

Zimperium

Zimperium has integrated IBM MaaS360 into zConsole, the administrative console that supports our award-winning mobile threat defense (MTD) solution, zIPS. With “Zimperium for MaaS360,” MaaS360 owners can now detect mobile risks and threats with Zimperium, and then set compliance and remediation policies them via MaaS360. Watch our on-demand webinar to learn more about Zimperium’s integration with IBM MaaS360. In this recorded event, we review how Zimperium and IBM work together, including: Deployment / activation.
Watch Now